Internet Draft                                   Denis Pinkas, Integris
draft-ietf-pkix-dpv&dpd-req-01.txt       Russ Housley, RSA Laboratories
Target Category: INFORMATIONAL                             January 2002
Expires in six months 


        Delegated Path Validation and Delegated Path Discovery 
                   Protocol Requirements (DPV&DPD-REQ)
                   <draft-ietf-pkix-dpv-dpd-req-01.txt>


Status of this memo

This document is an Internet-Draft and is in full conformance with all 
provisions of Section 10 of RFC 2026.

Internet-Drafts are working documents of the Internet Engineering Task 
Force (IETF), its areas, and its working groups.  Note that other 
groups may also distribute working documents as Internet-Drafts. 

Internet-Drafts are draft documents valid for a maximum of six months 
and may be updated, replaced, or obsoleted by other documents at any 
time. It is inappropriate to use Internet-Drafts as reference 
material or to cite them other than as "work in progress."

The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt

The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.

Abstract

This document specifies requirements for two main request/response 
pairs.

The first one, called Delegated Path Validation (DPV), can be used to 
fully delegate a path validation processing to an DPV server, 
according to a set of rules, called a validation policy. 

The second one, called Delegated Path Discovery (DPD), can be used to 
obtain from a DPD server all the information needed (e.g., the end-
entity certificate, the CA certificates, full CRLs, delta-CRLs, OCSP 
responses) to locally validate a certificate. The DPD server uses a 
set of rules, called a path discovery policy, to determine which 
information to return. 

A third request/response pair can be used to allow clients to obtain 
the references for the policies supported by a server.

This document also defines the requirements for two optional 
request/response pairs. The first one is used to establish a 
validation policy with a DPV server. The second one is used to 
establish a discovery policy with a DPD server. Either 
request/response pair provide a reference of an existing policy to 
obtain policy details.

Pinkas                                                         [Page 1]

Internet Draft               DPV&DPD-REQ                   January 2002


   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in 
   this document (in uppercase, as shown) are to be interpreted as 
   described in [RFC2119].

1. Rationale and benefits

These delegated processing provides two primary services: delegated 
path validation and delegated path discovery. Some clients require 
a server to perform path validation and have no need for data 
acquisition, while some other clients require only delegated path 
discovery in support of local path validation.

2. Rationale and benefits for DPV (Delegated Path Validation)

DPV allows a server to perform a real time certificate validation for 
a time T, where T may be the current time or a time in the recent past, 
for any certificate in support of any security service. 

In order to validate a certificate, a chain of multiple certificates, 
called a certification path, may be needed, comprising a certificate 
of the public key owner (the end entity) signed by one CA, and zero or 
more additional certificates of CAs signed by other CAs.

Offloading path validation to a server may be required by a client 
that lacks the processing, and/or communication capabilities to 
perform path construction first and then a local path validation.

In constrained execution environments, such as telephones and PDAs, 
memory and processing limitations may preclude local implementation of 
complete, PKIX-compliant path validation.

In applications where minimum latency is critical, delegating 
validation to a trusted server can offer significant advantages.
The time required to send the target certificate to the validation 
server, receive the response, and authenticate the response, 
can be considerably less than the time required for the client to 
perform certification path discovery and validation. Even if a 
certification path were readily available to the client, the 
processing time associated with signature verification for each 
certificate in the path might (especially when validating very long 
paths or using very limited processor speed) be greater than the delay 
associated with use of a validation server.

Another motivation for offloading path validation is that it allows 
validation against validation policies defined by the management in a 
consistent fashion across an enterprise. Clients that are able to 
do their own path validation may rely on a trusted server to do path 
validation if centralized management of validation policies is needed, 
or the clients rely on a trusted server to leave centralized traces 
of such activities.



Pinkas                                                         [Page 2]

Internet Draft               DPV&DPD-REQ                   January 2002

When a client uses this service, it inherently trusts the server as 
much as it would its own path validation software (if it contained 
such software). Clients can direct the server to perform path 
validation in accordance with a particular validation policy.

3. Rationale and benefits for DPD (Delegated Path Discovery)

DPD is valuable for clients that do much of the PKI processing 
themselves and simply want a server to collect information for them. 
The server is trusted to return the most current information that is 
available to it (which may not be the most current information that 
has been issued). The client will ultimately perform certification 
path validation.

A client that performs path validation for itself may get benefit in
several ways from using a server to acquire certificates, CRLs, and 
OCSP responses to aid in the validation process. In this context, the 
client is relying on the server to interact with repositories to 
acquire the data that the client would otherwise have to acquire using 
LDAP [LDAP], HTTP [HTTP], FTP [FTP] or another repository access 
protocol. Since these data items are digitally signed, the client need 
not trust the server any more than the client would trust the 
repositories. 

There are several benefits to this approach; for example, a single 
query to a server can replace multiple queries to one or more 
repositories, and caching by the server can reduce latency. Another 
benefit to the client system is that it need not incorporate a diverse 
set of software to interact with various forms of repositories, 
perhaps via different protocols, nor to perform the graph processing 
necessary to discover certification paths, separate from making the 
queries to acquire path validation data.

4. Validation policy and path discovery policy

Policies MAY be a priori known by the server, or policies MAY be 
specified by a client to the server.

Because validation software is controlled by many parameters which, 
if incorrectly set, may result in insecure behavior, it is useful
to rely on pre-defined policies that are already known by the servers, 
where system security administrators carefully manage them. 

Both services (delegated path validation and delegated path discovery) 
can be potentially used by an enterprise for enforcing various aspects 
of centralized policies.

Alternatively, system security administrators MAY also define policies.
However, such policy definition may be quite complex and only some 
forms of policies can be defined in this way, otherwise testing all 
the possible variations would lead to non-interoperable implementations
or would increase the time necessary to ensure that two implementations 
are interoperable.


Pinkas                                                         [Page 3]

Internet Draft               DPV&DPD-REQ                   January 2002

Since policy definitions can be quite long and complex, all the 
parameters SHOULD NOT be passed with each individual request; rather, 
they SHOULD be defined using a separate policy definition 
request/response pair. In response to a successful policy definition 
request, the server SHALL return a policy reference (e.g. an OID).

However, some forms of path discovery policy can be simple. In 
that case it MAY be acceptable to pass the parameters from the path 
discovery policy with each individual request, i.e. a set of trust 
anchors and separate revocation status conditions for the end-entity 
certificate and for the other certificates (see section 9.2).

The protocol SHALL allow clients to obtain, at any time, the references
for all of the policies supported by the server by using an additional 
request/response pair. The response can include references to previously 
defined policies or to a priori known policies.

4.1. Validation Policy

A validation policy is a set of rules against which the validation of 
the certificate is performed. 

A validation policy MAY include several trust anchors. A trust anchor 
is defined as one public key, a CA name, a validity time interval, and 
optionally additional constrains. The use of a self-signed certificate 
is one way to specify together: the public key to be used, the CA 
name, and the validity period of the public key. 

Additional constrains for each trust anchor MAY be defined. These 
constraints might include a set of Certification Policy constraints or 
a set of naming constraints. These constrains MAY also be included in 
self-signed certificates.

Additional conditions that apply to the certificates in the path MAY 
also be specified in the validation policy. For example, specific 
values for user-initial-policy-set, initial-policy-mapping-inhibit, 
initial-explicit-policy, or initial-any-policy-inhibit could be 
provided.

Additional conditions that apply to the end-entity certificate MAY 
also be specified in the validation policy. For example, a specific 
name form, like an e-mail address either in the rfc822 subject 
alternative name or in the emailAddress naming attribute in the 
subject name, might be required.

In order to succeed, one valid certification path (i.e., none of the 
certificates in the path are expired or revoked) MUST be found between 
an end-entity certificate and a trust anchor and all constraints that 
apply to the certification path MUST be verified.

Validation policies support security services in two time contexts:

   - for immediate use (e.g., to use the public key within a 
     certificate for symmetric key management), or

Pinkas                                                         [Page 4]

Internet Draft               DPV&DPD-REQ                   January 2002

   - for a time T in the recent past (e.g., to use the public key 
     within a certificate to verify data origin authentication and 
     integrity).

There is an inevitable delay between a compromise of key being noticed 
by the end-entity and the report of revocation being made by the CA 
(or on behalf of the CA) to the relying parties. This delay exists 
even when an OCSP service is used. So, querying the revocation status 
of a certificate at a time T never proves that the private key 
corresponding to that certificate was not compromised at that time T. 

A validation policy MAY support a cautionary period in order to allow 
time for:

   1) the end-entity to realize that one of its private keys has been 
      or could possibly be compromised, 

   2) the end-entity to report the key compromise,

   3) the revocation authority to process the revocation request from 
      the end-entity, and

   4) the revocation authority to make available the revocation 
      status information, e.g. by providing an OCSP service, CRLs, 
      or delta-CRLs in combination with full CRLs.

When the public key within the certificate is used immediately, it is 
not possible to apply a cautionary period, and thus, some risk is 
taken, since the corresponding private key might be compromised at the 
time of use.

When the public key within the certificate is used to verify some 
usage from the recent past, it is possible to apply a cautionary 
period to further reduce the risk. In such a case, the policy MAY 
indicate a minimum delay to be observed between the time T in the past,
i.e. when the use of the private key took was supposed to take place, 
and the time of the current verification.

When the end-entity certificate expires before the cautionary period 
terminates, then the end-entity certificate MUST be considered as 
invalid. According to section 3.3. Revocation from [PKIX-1] "An entry 
may be removed from the CRL after appearing on one regularly scheduled 
CRL issued beyond the revoked certificate's validity period", so in 
that case the revocation status information is not guaranteed to be 
available at the end of the cautionary period. If certificates are 
not used close to the end of their validity period, then this 
situation will not happen. This means that new certificates should be 
issued before the end of the validity period of the current 
certificate and with a time interval greater than the cautionary 
period.





Pinkas                                                         [Page 5]

Internet Draft               DPV&DPD-REQ                   January 2002


4.2. Path discovery policy

A path discovery policy is a set of rules against which the discovery 
of a certification path is performed. A path discovery policy is a 
subset of a validation policy. A path discovery policy MAY either be 
a reference to a validation policy or contain only some major elements 
from a validation policy, such as the trust anchors. 

Since the client must be "PKI aware", it can locally apply additional 
constraints to the certification paths returned by the server. Thus, 
a "crude" (i.e. simpler) criteria can be defined and used for DPD.

5. Delegated Path Validation Protocol Requirements

The Delegated Path Validation (DPV) protocol allows a server to 
validate one or more certificates according to a validation policy. 
A time other than the current time may be used to determine the 
validity. The validation policy SHALL be known by the DPV server. 
The validation policy MAY be defined using an additional request/
response pair (see section 10) prior to the DPV request. In this way 
clients only need to be aware of the reference of the validation 
policy to be used by a given application.

The certificate to be validated MUST either be directly provided in 
the request or an unambiguous reference MUST be provided, such as 
the CA distinguished name, certificate serial number, and the hash 
of the certificate, like ESSCertID as defined in [ESS] or 
OtherSigningCertificate as defined in [ES-F].

The client MUST be able to provide to the validation server, associated
with each certificate to be validated, "useful certificates", as well 
as "useful revocation information". Revocation information includes 
OCSP responses, CRLs, and delta-CRLs. As an example, an S/MIME message 
might include such information, and the client can simply copy that 
information into the DPV request.

In order to obtain the revocation status information of any 
certificate from the certification path, the DPV server might use, in 
accordance with the validation policy, different sources of revocation 
information, e.g. a combination of OCSP responses, CRLs, or delta-CRLs.

If the DPV request does not specify a validation policy, the server 
response MUST indicate the one that was used. In such a case, the 
client must verify that the one selected by the server is appropriate.

The DPV response MUST indicate one of four status alternatives:

   1) the certificate is valid according to the validation policy.

   2) the certificate is definitively invalid according to the 
      validation policy.



Pinkas                                                         [Page 6]

Internet Draft               DPV&DPD-REQ                   January 2002


   3) the certificate is not yet valid at this time. If another 
      request could made later on, the certificate could possibly be 
      determined as valid. This condition will occur before a 
      certificate validity period has begun, while a certificate is 
      suspended, or when the validation is made at a time where the 
      cautionary period has not yet ended. 

   4) the server cannot determine the validity of the certificate.
      This condition will occur when a certification path cannot be 
      constructed or some revocation information is unavailable.

The DPV request MUST allow the client to request the response to 
include the certification path and revocation status information used 
by the server to process the request. When requested, the server MUST 
include the certification path and revocation status information in 
the response when the certificate is valid according to the validation 
policy. However, the server MAY omit the certification path and 
revocation status information when the certificate is invalid or 
when it cannot determine the validity.

In order to be able to be confident that the validation of the 
certificate has correctly been done, the client only requires an 
authenticated response. 

In order for the client to prove to another party that trusts the 
same DPV server that the certificate validation was correct, the 
client requires a signed response. All the parameters needed to prove 
that the response conforms to the request SHALL be copied from the 
request into the response, so that a response is self-sufficient proof.

The server may require client authentication. The authentication 
method to be used may be dependant upon the transport used, and thus 
the client authentication mechanism need not be an integral part of 
the DPV request.

6. Delegated Path Discovery Protocol Requirements

The Delegated Path Discovery (DPD) protocol allows the client to use a 
single protocol towards a single server to collect at one time all the 
data elements that might be collected using different protocols (e.g. 
LDAP, DAP, OCSP) or by querying multiple servers, according to a 
single path discovery policy. Then returned information can be used to 
locally validate one or more certificates for the current time. 

Clients MUST be able to specify whether they want, in addition to the 
certification path, the revocation information associated with the 
path, for the end-entity certificate only, for the CA certificates 
only or for both.

The path discovery policy MUST be known by the DPD server. The path 
discovery policy MAY defined using an additional request/response pair
(see section 7) prior to the DPD request.


Pinkas                                                         [Page 7]

Internet Draft               DPV&DPD-REQ                   January 2002

The server response MUST include zero, one, or several certification 
paths. Each path consists of a sequence of certificates, starting with 
the certificate to be validated and ending with one issued by a trust 
anchor. The trust anchor self-signed certificate, if issued, is not 
included. In addition, the revocation information associated with 
each certificate in the path MUST also be returned, if it has been 
requested.

The client needs to be able to limit the number of paths returned. 
Therefore the client MUST be able to indicate the maximum number of 
certification paths that SHOULD be returned (provided that they can be 
found). If the number is not specified, that number defaults to one. 

The paths that are returned may need to match some additional local 
controls done by the client, e.g. verifying some certificate 
extensions. The returned paths may not be appropriate to the client 
when it locally applies additional tests. Instead of asking one by 
one the paths (which would require state information at the server), 
the client specifies with every request the maximum number of paths 
to be returned.

If that number cannot be reached by the server, an indication SHOULD 
be returned by the server showing that an additional query will not 
return more paths.

If the paths that are returned do not match the local conditions, then 
the number of number of certification paths to be returned can be 
extended, by augmenting this value. Previously found paths will likely 
be returned, but the client can easily discard them. This avoids 
requirements for state information at the server, but does not prevent 
a server from maintaining a cache of previous responses.

The goal is to avoid the maintenance of state information for previous 
requests: if this is done, it minimizes potential denial of service 
attacks or other problems associated with server crashes.

Path discovery MUST be performed according to the path discovery policy. 

The DPD response MUST indicate one of four status alternatives:

   1) one or more certification paths was found according to the 
      path discovery policy, with all of the requested revocation 
      information present.

   2) one or more certification paths was found according to the 
      path discovery policy, with a subset of the requested revocation 
      information present.

   3) one or more certification paths was found according to the 
      path discovery policy, with none of the requested revocation 
      information present.

   4) no certification path was found according to the path 
      discovery criteria.

Pinkas                                                         [Page 8]

Internet Draft               DPV&DPD-REQ                   January 2002


The information that is returned consists of one or more certification 
paths and optionally its associated revocation status information for 
each element from the path. 

To provide confidence that the response originates from the DPD server,
the server MAY provide an authenticated response. For example, the 
server might sign the response.

7. Policy definition protocol (PDP) requirements

The support of these request/response pairs is OPTIONAL, or they might 
be implemented in a separate protocol from DPD or DPV. 

These request/response pairs allow the client to define a policy, 
i.e. a validation policy and/or a path discovery policy, and to 
receive back a reference for that policy. The server may provide a 
reference to a previously defined policy, if it fulfills the request 
requirements.

The policies locally defined at the server may be more precise than 
the policies defined using these request/response pairs, since such an 
exchange will not have all the flexibility necessary to describe any 
kind of policy. So, in practice, these request/response pairs will be 
restricted to the definition of relatively simple policies.

Usually, these request/response pairs will be used by managers to 
register the policies to be used by ordinary clients, such as those 
within an organization for use with various applications.

Policy definition requests SHALL be able to be authenticated so that 
only authorized clients can register policies.

Policy definition response, if successful, SHALL return a policy 
reference. The policy reference MAY be specific to the request, or 
it MAY be a reference to a policy that has already been established 
and fulfills the request requirements.

It is up to server to decide how long a temporary defined policy will 
be maintained.

When a obtaining a policy reference from the server, it would be 
interesting to consider providing natural language information about 
the purpose of the policy, rather than the technical description of 
the policy. 

When using DPV, there are two possibilities:

   a) The client is a little bit PKI-aware, in the sense that it is 
      only able to parse the end-entity certificate to check some 
      properties of a certificate, and delegates the validation of the 
      rest of the path to the server. It appears easier to remotely 
      define such "partial policies" since some tests on the end-
      entity certificate are left to the client.

Pinkas                                                         [Page 9]

Internet Draft               DPV&DPD-REQ                   January 2002


   b) The client is fully PKI-unaware, and thus fully delegates the 
      validation to the server. It appears more difficult to remotely 
      define such "complete policies" since the tests on the end-
      certificate are made by the server and may be quite complex.

When using DPD, simpler validation policies may be defined since 
all DPD clients are fully PKI-aware.

8. Components for a validation policy

A validation policy is build from four components:

   1. Certification path requirements,
   2. Revocation requirements,
   3. End-entity certificate specific requirements,
   4. optionally, cautionary period requirements.

Note: [ES-P] defines ASN.1 data elements that may be useful while 
defining the components of a validation policy.

8.1. Certificate chain requirements

The PDP protocol MUST allow the client to specify certification path 
requirements. The path requirements identify a sequence of trust 
anchors used to start certification path processing and initial 
conditions for certification path validation as defined in [PKIX-1]. 

8.2. Revocation Requirements

The PDP protocol MUST allow the client to specify revocation checking 
requirements. Revocation information may be obtained through CRLs, 
delta-CRLs or OCSP responses. Certificate revocation requirements are 
specified both in terms of checks required on the end-entity 
certificate (i.e. the certificate for which a path is required) and on 
checks required on CA certificates.

Revocation requirements for the end-entity certificate may not be the 
same as the requirements for the CA certificates. For example, an OCSP 
response may be needed for the end-entity certificate while CRLs may 
be sufficient for the CA certificates. Therefore, the PDP protocol 
MUST allow the client to specify separate requirements for the 
end-entity certificate and for the CA certificates.

The PDP protocol MUST allow the client to specify the source of revocation 
information, in particular if :

   - full CRLs (or full Authority revocation lists) have to be 
     collected,

   - OCSP responses, using [OCSP], have to be collected,

   - delta-CRLs and the relevant associated full CRLs (or full 
     Authority revocation lists) are to be collected.

Pinkas                                                        [Page 10]

Internet Draft               DPV&DPD-REQ                   January 2002


   - any available revocation information has to be collected.

8.3. End-entity certificate specific requirements

The PDP protocol MUST allow the client to specify requirements that 
apply only to the end-entity certificate (i.e. the certificate that 
is the object of the query). 

The client might require the end-entity certificate to contain 
specific extensions with specific types or values (it does not matter 
whether they are critical or non-critical). 

For example, the client might need an end-entity certificate that 
contains an electronic mail address (either in the rfc822 subject alt 
name or in the emailAddress naming attribute in the subject name).

8.4. Cautionary period requirements

The PDP protocol SHALL allow the client to specify a cautionary period 
for a validation policy. The cautionary period specifies a minimum 
delay to be observed between a time T in the recent past, where the 
use of the private key or the public key is supposed to take place, 
and the time of the current validation.

9. Components for a path discovery policy

The PDP protocol SHALL be able to support certification path 
requirements and revocation requirements. It MAY support end-entity 
certificate specific requirements. These requirements are specified in 
sections 8.1, 8.2, and 8.3, respectively.

10. DPV versus DSV

DPV performs the validation of a certificate against a policy, but 
does not necessarily provide all the information needed to prove to 
someone else that is not trusting the same DPV server that a digital 
signature from a signer was produced while the signer's certificate 
was valid. 

A Delegated Signature Validation (DSV) service could be specified to 
allow to prove later on to someone else, not trusting the same DSV 
server, that a digital signature was applied while the certificate 
was valid. Requirements for a Delegated Signature Validation (DSV) 
service that allows to fully delegate the validation of a digital 
signature to a DSV server might be addressed in a separate document at 
a future time. 

11. Security considerations

A client must trust a DPV server to provide the correct answer. 
However, this does not mean that all clients will trust the same 
servers. While a positive answer might be sufficient for one client, 
that positive answer will not necessarily convince another client. 

Pinkas                                                        [Page 11]

Internet Draft               DPV&DPD-REQ                   January 2002

Other clients may trust their own servers, or they might perform 
certification path validation themselves. Clients operating under 
an organizational policy must ensure that each of the servers they 
trust is operating under that organizational policy. 

12. Acknowledgments

These requirements have been refined after some valuable inputs from 
Ambarish Malpani and Paul Hoffman.

13. References

   [PKIX-1]

      Internet X.509 Public Key Infrastructure.
      Certificate and CRL Profile. RFC 2459
      R. Housley, W. Ford, W. Polk, D. Solo.
      or its successor as soon as it can be referenced.

   [OCSP] 

      X.509 Internet Public Key Infrastructure. 
      Online Certificate Status Protocol - OCSP. RFC 2560
      M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams.

   [ES-F]

      Electronic Signature Formats for long term electronic signatures
      RFC 3126. D. Pinkas, J. Ross, N. Pope. September 2001.

   [ES-P]

      Electronic Signature Policies. RFC 3125.
      D. Pinkas, J. Ross, N. Pope. September 2001.

   [CMS] 

      Cryptographic Message Syntax. RFC 2630. R. Housley June 1999.
      or its successor as soon as it can be referenced.

   [ESS] 

      Enhanced Security Services for S/MIME. RFC 2634. P. Hoffman. 
      RFC 2634, June 1999.

   [ISO-X509] 

      ISO/IEC 9594-8/ITU-T Recommendation X.509, "Information
      Technology - Open Systems Interconnection: The Directory:
      Authentication Framework," 1997 edition. (Pending publication
      of 1997 edition, use 1993 edition with the following amendment
      applied: Final Text of Draft Amendment DAM 1 to ISO/IEC 9594-8
      on Certificate Extensions, June 1996.)


Pinkas                                                        [Page 12]

Internet Draft               DPV&DPD-REQ                   January 2002


   [FTP]

      Internet X.509 Public Key Infrastructure. Operational Protocols:
      FTP and HTTP. RFC 2585. R. Housley, P. Hoffman. May 1999.

   [HTTP]

      Internet X.509 Public Key Infrastructure. Operational Protocols:
      FTP and HTTP. RFC 2585. R. Housley, P. Hoffman. May 1999.

   [LDAP]

      Internet X.509 Public Key Infrastructure Operational Protocols 
      LDAPv2. RFC 2559. S. Boeyen, T. Howes, P. Richard. April 1999.

14. Authors' addresses

   Denis Pinkas
   Integris, Bull.
   68, Route de Versailles
   78434 Louveciennes CEDEX
   FRANCE
   e-mail: Denis.Pinkas@bull.net

   Russell Housley
   RSA Laboratories
   918 Spring Knoll Drive
   Herndon, VA 20170
   USA
   rhousley@rsasecurity.com

15. Full Copyright Statement

   Copyright (C) The Internet Society (2001).  All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph
   are included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.



Pinkas                                                        [Page 13]

Internet Draft               DPV&DPD-REQ                   January 2002


   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
















































Pinkas                                                        [Page 14]